In our last VoIP installment, we looked at the main reasons why SIP has become a widely adopted protocol, but we left details of the protocol’s inner workings fairly vague. This article will drill ...
RFC 4474 implements Public Key Infrastructure (PKI). This provides an authenticated identity for the originator of a VoIP call. There is a security hole in the SIP protocol. According to John Nix, VP, ...
Session Initiation Protocol is used widely for the setup, teardown and management of VoIP calls. Much of its functionality is related to the setup of calls, as its name implies. Part of this setup ...